Templates as master keys

  • Authors:
  • Dakshi Agrawal;Josyula R. Rao;Pankaj Rohatgi;Kai Schramm

  • Affiliations:
  • IBM Watson Research Center, Yorktown Heights, NY;IBM Watson Research Center, Yorktown Heights, NY;IBM Watson Research Center, Yorktown Heights, NY;Communication Security Group, Ruhr-Universität Bochum, Bochum, Germany

  • Venue:
  • CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We introduce two new attacks: the single-bit template attack and the template-enhanced DPA attack. The single-bit template attack can be used very effectively to classify even single bits in a single side channel sample with a high probability of correctness. The template-enhanced DPA attack, combines traditional DPA with single-bit template attacks to show that if an adversary has access to a test card with even a slightly biased RNG, then he/she can break protected cryptographic implementations on a target card even if they have perfect RNGs. In support of our claim, we report results from experiments on breaking two implementations of DES and AES protected by the masking countermeasure running on smartcards of different manufacturers. In light of these results, the threat of template attacks, generally viewed as intrinsically difficult to mount, needs to be reconsidered.